Home → Magazine Archive → February 2013 (Vol. 56, No. 2)
Table of Contents
PDFPage 7
When Reviews Do More Than Sting
Bertrand Meyer wonders why malicious reviews run rampant in computer science.
Pages 8-9Pages 11-13
Seeking to protect the fundamental privacy of network interactions.
Pages 20-22My previous column, "The Foresight Saga, Redux," began a discussion that is continued here regarding some lessons learned from the 2012 U.S. November elections. In addition, I reflect on the collateral effects of Hurricane Sandy …
Pages 23-25Pages 26-27
Reflections on Stanford's MOOCs
New possibilities in online education create new challenges.
Pages 28-30The Value of Microprocessor Designs
Applying a centuries-old technique to modern cost estimation.
Pages 31-32How to address the lack of transparency, trust, and acceptance in cloud services.
Pages 33-36Our authentication system is lacking. Is improvement possible?
Pages 40-44Thinking Methodically About Performance
The USE method addresses shortcomings in other commonly used methodologies.
Pages 45-51A Decade of OS Access-Control Extensibility
Open source security foundations for mobile and embedded devices.
Pages 52-63Pages 64-73
Symbolic Execution For Software Testing: Three Decades Later
Pages 82-90Page 92
These puzzles involve computing probabilities associated with dice.
Page 112